Install Guide

Table Of Contents
Debugging the DHCP Server................................................................................................................................. 250
Using DHCP Clear Commands................................................................................................................................251
Configure the System to be a DHCP Client..............................................................................................................251
Configuring the DHCP Client System...................................................................................................................251
DHCP Client on a Management Interface...........................................................................................................252
DHCP Client Operation with Other Features.....................................................................................................253
DHCP Relay When DHCP Server and Client are in Different VRFs................................................................... 253
Configuring Route Leaking between VRFs on DHCP Relay Agent...............................................................254
Non-default VRF configuration for DHCPv6 helper address...............................................................................255
Configuring DHCP relay source interface.................................................................................................................255
Global DHCP relay source IPv4 or IPv6 configuration ....................................................................................255
Interface level DHCP relay source IPv4 or IPv6 configuration .....................................................................256
Configure the System for User Port Stacking (Option 230)............................................................................... 257
Configure Secure DHCP................................................................................................................................................257
Option 82 (DHCPv4 relay options).......................................................................................................................257
DHCPv6 relay agent options..................................................................................................................................258
DHCP Snooping.........................................................................................................................................................258
Drop DHCP Packets on Snooped VLANs Only...................................................................................................261
Dynamic ARP Inspection......................................................................................................................................... 262
Configuring Dynamic ARP Inspection...................................................................................................................262
Source Address Validation............................................................................................................................................ 263
Enabling IP Source Address Validation................................................................................................................ 263
DHCP MAC Source Address Validation............................................................................................................... 264
Enabling IP+MAC Source Address Validation.................................................................................................... 264
Viewing the Number of SAV Dropped Packets................................................................................................. 265
Clearing the Number of SAV Dropped Packets.................................................................................................265
Chapter 13: Equal Cost Multi-Path (ECMP)............................................................................... 266
ECMP for Flow-Based Affinity.................................................................................................................................... 266
Configuring the Hash Algorithm............................................................................................................................ 266
Enabling Deterministic ECMP Next Hop............................................................................................................. 266
Configuring the Hash Algorithm Seed..................................................................................................................267
Link Bundle Monitoring.................................................................................................................................................. 267
Managing ECMP Group Paths............................................................................................................................... 267
Creating an ECMP Group Bundle..........................................................................................................................268
Modifying the ECMP Group Threshold................................................................................................................268
.......................................................................................................................................................................................268
Support for ECMP in host table............................................................................................................................268
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ....................................................................269
Chapter 14: FIP Snooping.......................................................................................................... 270
Fibre Channel over Ethernet........................................................................................................................................ 270
Ensure Robustness in a Converged Ethernet Network.........................................................................................270
FIP Snooping on Ethernet Bridges.............................................................................................................................. 271
FIP Snooping in a Switch Stack...................................................................................................................................273
Using FIP Snooping.........................................................................................................................................................273
FIP Snooping Prerequisites..................................................................................................................................... 273
Important Points to Remember............................................................................................................................. 273
Enabling the FCoE Transit Feature.......................................................................................................................274
Contents
9